Access permission verification vulnerability in the Contacts module Impact: Successful exploitation of this vulnerability may affect service confidentiality.
The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Emui | Huawei | 12.0.0 (including) | 12.0.0 (including) |
| Emui | Huawei | 13.0.0 (including) | 13.0.0 (including) |
| Emui | Huawei | 14.0.0 (including) | 14.0.0 (including) |
| Harmonyos | Huawei | 2.0.0 (including) | 2.0.0 (including) |
| Harmonyos | Huawei | 2.1.0 (including) | 2.1.0 (including) |
| Harmonyos | Huawei | 3.0.0 (including) | 3.0.0 (including) |
| Harmonyos | Huawei | 3.1.0 (including) | 3.1.0 (including) |
| Harmonyos | Huawei | 4.0.0 (including) | 4.0.0 (including) |
| Harmonyos | Huawei | 4.2.0 (including) | 4.2.0 (including) |
Assuming a user with a given identity, authorization is the process of determining whether that user can access a given resource, based on the user’s privileges and any permissions or other access-control specifications that apply to the resource. When access control checks are not applied consistently - or not at all - users are able to access data or perform actions that they should not be allowed to perform. This can lead to a wide range of problems, including information exposures, denial of service, and arbitrary code execution.